Results 21 to 30 of about 36,975 (185)

Post-Quantum Cryptography

open access: yesARIS2 - Advanced Research on Information Systems Security, 2022
Cryptography is used broadly in the digital age, making our communications secure, ensuring our data is safe, and enabling secure transactions on which we rely daily. Our reality is connected, we send an email without thinking about all the underlying protocols, we buy online, and we check the weather on our fridge. Utilizations are countless and so is
openaire   +2 more sources

QKD-Enhanced Cybersecurity Protocols

open access: yesIEEE Photonics Journal, 2021
Security of QKD is guaranteed by the quantum mechanics laws rather than unproven assumptions employed in computational cryptography. Unfortunately, the secret-key rates are way too low and transmission distances are limited. The post-quantum cryptography
Ivan B. Djordjevic
doaj   +1 more source

Post-quantum distributed ledger technology: a systematic survey

open access: yesScientific Reports, 2023
Blockchain technology finds widespread application across various fields due to its key features such as immutability, reduced costs, decentralization, and transparency.
Nikhil Kumar Parida   +4 more
doaj   +1 more source

Lattice‐based cryptosystems in standardisation processes: A survey

open access: yesIET Information Security, 2023
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives.
Anyu Wang, Dianyan Xiao, Yang Yu
doaj   +1 more source

NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation

open access: yesApplied Sciences, 2023
The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC standard.
Gyeongju Song   +4 more
doaj   +1 more source

Quantum Computing Paradigms Implications for Cryptography and Data Security in Information Systems [PDF]

open access: yesITM Web of Conferences
Quantum computing has the potential to transforming computational paradigms, posing both a threat and an opportunity to contemporary cryptographic systems and data security frameworks.
Kumar Bathala Naresh   +5 more
doaj   +1 more source

Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era

open access: yesIEEE Access, 2023
This paper examines the asymptotic performance of multiplication and the cost of quantum implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the classical and quantum cases and provides insights into multiplication roles in the ...
Dedy Septono Catur Putranto   +3 more
doaj   +1 more source

Evaluation of Post-Quantum Distributed Ledger Cryptography

open access: yesThe Journal of The British Blockchain Association, 2019
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (**ECDSA**) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as Multi-Chain ...
Robert Campbell Sr.
doaj   +2 more sources

Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together

open access: yesFrontiers in Quantum Science and Technology, 2023
Most currently used cryptographic tools for protecting data are based on certain computational assumptions, which makes them vulnerable with respect to technological and algorithmic developments, such as quantum computing.
Aleksey K. Fedorov, Aleksey K. Fedorov
doaj   +1 more source

HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme

open access: yesEngineering Science and Technology, an International Journal, 2022
The schemes submitted to NIST call for standardization of post-quantum cryptography have some common drawbacks in terms of decryption failure probability, scalability, and switching issues from pre-quantum to post- quantum cryptography. In this paper, we
Simran Choudhary, Anil Gupta
doaj   +1 more source

Home - About - Disclaimer - Privacy